Esc
Security Software Discovery - T1518.001
(ATT&CK® Technique)
Definition
Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as cloud monitoring agents and anti-virus. Adversaries may use the information from Security Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.
graph LR; T1518001["Security Software Discovery"] --> |may-access| KernelProcessTable["Kernel Process Table"]; class T1518001 OffensiveTechniqueNode; class KernelProcessTable ArtifactNode; click KernelProcessTable href "../../../dao/artifact/d3f:KernelProcessTable"; click T1518001 href "../../../offensive-technique/attack/T1518.001/"; click KernelProcessTable href "../../../dao/artifact/d3f:KernelProcessTable"; T1518001["Security Software Discovery"] --> |may-access| FileSystemMetadata["File System Metadata"]; class T1518001 OffensiveTechniqueNode; class FileSystemMetadata ArtifactNode; click FileSystemMetadata href "../../../dao/artifact/d3f:FileSystemMetadata"; click T1518001 href "../../../offensive-technique/attack/T1518.001/"; click FileSystemMetadata href "../../../dao/artifact/d3f:FileSystemMetadata"; T1518001["Security Software Discovery"] --> |may-invoke| GetRunningProcesses["Get Running Processes"]; class T1518001 OffensiveTechniqueNode; class GetRunningProcesses ArtifactNode; click GetRunningProcesses href "../../../dao/artifact/d3f:GetRunningProcesses"; click T1518001 href "../../../offensive-technique/attack/T1518.001/"; click GetRunningProcesses href "../../../dao/artifact/d3f:GetRunningProcesses"; T1518001["Security Software Discovery"] --> |may-access| SystemConfigurationDatabaseRecord["System Configuration Database Record"]; class T1518001 OffensiveTechniqueNode; class SystemConfigurationDatabaseRecord ArtifactNode; click SystemConfigurationDatabaseRecord href "../../../dao/artifact/d3f:SystemConfigurationDatabaseRecord"; click T1518001 href "../../../offensive-technique/attack/T1518.001/"; click SystemConfigurationDatabaseRecord href "../../../dao/artifact/d3f:SystemConfigurationDatabaseRecord"; T1518001["Security Software Discovery"] --> |may-access| SystemFirewallConfiguration["System Firewall Configuration"]; class T1518001 OffensiveTechniqueNode; class SystemFirewallConfiguration ArtifactNode; click SystemFirewallConfiguration href "../../../dao/artifact/d3f:SystemFirewallConfiguration"; click T1518001 href "../../../offensive-technique/attack/T1518.001/"; click SystemFirewallConfiguration href "../../../dao/artifact/d3f:SystemFirewallConfiguration"; ContentQuarantine["Content Quarantine"] --> | quarantines | SystemConfigurationDatabaseRecord["System Configuration Database Record"]; ContentQuarantine["Content Quarantine"] -.-> | may-isolate | T1518001["Security Software Discovery"] ; class ContentQuarantine DefensiveTechniqueNode; class SystemConfigurationDatabaseRecord ArtifactNode; click ContentQuarantine href "../../../technique/d3f:ContentQuarantine"; SystemCallFiltering["System Call Filtering"] --> | filters | GetRunningProcesses["Get Running Processes"]; SystemCallFiltering["System Call Filtering"] -.-> | may-isolate | T1518001["Security Software Discovery"] ; class SystemCallFiltering DefensiveTechniqueNode; class GetRunningProcesses ArtifactNode; click SystemCallFiltering href "../../../technique/d3f:SystemCallFiltering"; RestoreConfiguration["Restore Configuration"] --> | restores | SystemConfigurationDatabaseRecord["System Configuration Database Record"]; RestoreConfiguration["Restore Configuration"] -.-> | may-restore | T1518001["Security Software Discovery"] ; class RestoreConfiguration DefensiveTechniqueNode; class SystemConfigurationDatabaseRecord ArtifactNode; click RestoreConfiguration href "../../../technique/d3f:RestoreConfiguration"; RestoreConfiguration["Restore Configuration"] --> | restores | SystemFirewallConfiguration["System Firewall Configuration"]; class RestoreConfiguration DefensiveTechniqueNode; class SystemFirewallConfiguration ArtifactNode; click RestoreConfiguration href "../../../technique/d3f:RestoreConfiguration"; SystemCallAnalysis["System Call Analysis"] --> | analyzes | GetRunningProcesses["Get Running Processes"]; SystemCallAnalysis["System Call Analysis"] -.-> | may-detect | T1518001["Security Software Discovery"] ; class SystemCallAnalysis DefensiveTechniqueNode; class GetRunningProcesses ArtifactNode; click SystemCallAnalysis href "../../../technique/d3f:SystemCallAnalysis";